Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package gpg2 for openSUSE:Factory checked in at 2022-10-18 12:44:45 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/gpg2 (Old) and /work/SRC/openSUSE:Factory/.gpg2.new.2275 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "gpg2" Tue Oct 18 12:44:45 2022 rev:163 rq:1029595 version:2.3.8 Changes: -------- --- /work/SRC/openSUSE:Factory/gpg2/gpg2.changes 2022-08-10 17:12:37.949603455 +0200 +++ /work/SRC/openSUSE:Factory/.gpg2.new.2275/gpg2.changes 2022-10-18 12:45:10.921748617 +0200 @@ -1,0 +2,38 @@ +Mon Oct 17 11:35:11 UTC 2022 - Pedro Monreal <pmonr...@suse.com> + +- GnuPG 2.3.8: + * gpg: Do not consider unknown public keys as non-compliant while + decrypting. + * gpg: Avoid to emit a compliance mode line if Libgcrypt is + non-compliant. + * gpg: Improve --edit-key setpref command to ease c+p. + * gpg: Emit an ERROR status if --quick-set-primary-uid fails and + allow to pass the user ID by hash. + * gpg: Actually show symmetric+pubkey encrypted data as de-vs + compliant. Add extra compliance checks for symkey_enc packets. + * gpg: In de-vs mode use SHA-256 instead of SHA-1 as implicit + preference. + * gpgsm: Fix reporting of bad passphrase error during PKCS#11 + import. + * agent: Fix a regression in "READKEY --format=ssh". + * agent: New option --need-attr for KEYINFO. + * agent: New attribute "Remote-list" for use by KEYINFO. + * scd: Fix problem with Yubikey 5.4 firmware. + * dirmngr: Fix CRL Distribution Point fallback to other schemes. + * dirmngr: New LDAP server flag "areconly" (A-record-only). + * dirmngr: Fix upload of multiple keys for an LDAP server specified + using the colon format. + * dirmngr: Use LDAP schema v2 when a Base DN is specified. + * dirmngr: Avoid caching expired certificates. + * wkd: Fix path traversal attack in gpg-wks-server. Add the mail + address to the pending request data. + * wkd: New command --mirror for gpg-wks-client. + * gpg-auth: New tool for authentication. + * New common.conf option no-autostart. + * Silence warnings from AllowSetForegroundWindow unless + GNUPG_EXEC_DEBUG_FLAGS is used. + * Rebase gnupg-detect_FIPS_mode.patch + * Remove patch upstream: + - gnupg-2.3.7-scd-openpgp-Fix-workaround-for-Yubikey-heuristics.patch + +------------------------------------------------------------------- Old: ---- gnupg-2.3.7-scd-openpgp-Fix-workaround-for-Yubikey-heuristics.patch gnupg-2.3.7.tar.bz2 gnupg-2.3.7.tar.bz2.sig New: ---- gnupg-2.3.8.tar.bz2 gnupg-2.3.8.tar.bz2.sig ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ gpg2.spec ++++++ --- /var/tmp/diff_new_pack.IcRQle/_old 2022-10-18 12:45:11.865750766 +0200 +++ /var/tmp/diff_new_pack.IcRQle/_new 2022-10-18 12:45:11.869750775 +0200 @@ -17,7 +17,7 @@ Name: gpg2 -Version: 2.3.7 +Version: 2.3.8 Release: 0 Summary: File encryption, decryption, signature creation and verification utility License: GPL-3.0-or-later @@ -39,7 +39,6 @@ Patch8: gnupg-accept_subkeys_with_a_good_revocation_but_no_self-sig_during_import.patch Patch9: gnupg-add-test-cases-for-import-without-uid.patch Patch10: gnupg-allow-import-of-previously-known-keys-even-without-UIDs.patch -Patch11: gnupg-2.3.7-scd-openpgp-Fix-workaround-for-Yubikey-heuristics.patch BuildRequires: expect BuildRequires: fdupes BuildRequires: ibmswtpm2 ++++++ gnupg-2.3.7.tar.bz2 -> gnupg-2.3.8.tar.bz2 ++++++ /work/SRC/openSUSE:Factory/gpg2/gnupg-2.3.7.tar.bz2 /work/SRC/openSUSE:Factory/.gpg2.new.2275/gnupg-2.3.8.tar.bz2 differ: char 11, line 1 ++++++ gnupg-detect_FIPS_mode.patch ++++++ --- /var/tmp/diff_new_pack.IcRQle/_old 2022-10-18 12:45:11.945750948 +0200 +++ /var/tmp/diff_new_pack.IcRQle/_new 2022-10-18 12:45:11.949750957 +0200 @@ -1,34 +1,18 @@ -Index: gnupg-2.1.1/g10/encrypt.c +Index: gnupg-2.3.8/g10/mainproc.c =================================================================== ---- gnupg-2.1.1.orig/g10/encrypt.c -+++ gnupg-2.1.1/g10/encrypt.c -@@ -783,7 +783,10 @@ encrypt_filter (void *opaque, int contro - /* Because 3DES is implicitly in the prefs, this can - only happen if we do not have any public keys in - the list. */ -- efx->cfx.dek->algo = DEFAULT_CIPHER_ALGO; -+ /* Libgcrypt manual says that gcry_version_check must be called -+ before calling gcry_fips_mode_active. */ -+ gcry_check_version (NULL); -+ efx->cfx.dek->algo = gcry_fips_mode_active() ? CIPHER_ALGO_AES : DEFAULT_CIPHER_ALGO; - } - - /* In case 3DES has been selected, print a warning if -Index: gnupg-2.1.1/g10/mainproc.c -=================================================================== ---- gnupg-2.1.1.orig/g10/mainproc.c -+++ gnupg-2.1.1/g10/mainproc.c -@@ -719,7 +719,12 @@ proc_plaintext( CTX c, PACKET *pkt ) +--- gnupg-2.3.8.orig/g10/mainproc.c ++++ gnupg-2.3.8/g10/mainproc.c +@@ -1011,7 +1011,12 @@ proc_plaintext( CTX c, PACKET *pkt ) according to 2440, so hopefully it won't come up that often. There is no good way to specify what algorithms to use in that case, so these there are the historical answer. */ - gcry_md_enable (c->mfx.md, DIGEST_ALGO_RMD160); + + /* Libgcrypt manual says that gcry_version_check must be called -+ before calling gcry_fips_mode_active. */ ++ * before calling gcry_fips_mode_active. */ + gcry_check_version (NULL); -+ if( !gcry_fips_mode_active() ) -+ gcry_md_enable( c->mfx.md, DIGEST_ALGO_RMD160 ); ++ if(!gcry_fips_mode_active()) ++ gcry_md_enable(c->mfx.md, DIGEST_ALGO_RMD160); gcry_md_enable (c->mfx.md, DIGEST_ALGO_SHA1); } if (DBG_HASHING)